- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Datadog provides built-in threat intelligence for Cloud SIEM logs. This article explains how to extend that functionality by enriching logs with your own custom threat intelligence feeds.
Cloud SIEM supports enriching and searching logs using threat intelligence indicators of compromise (IOCs) stored in Datadog reference tables. Reference Tables allow you to combine metadata with information already in Datadog.
Threat intelligence is supported in the CSV format, and requires a table for each Indicator type (for example, IP address) and requires the following columns:
Field | Data | Description | Required | Example |
---|---|---|---|---|
ip_address | text | The primary key for the reference table in the IPv4 dot notation format. | true | 192.0.2.1 |
additional_data | json | Additional data to enrich the logs. | false | {"ref":"hxxp://example.org"} |
category | text | The threat intel category. This is used by some out-of-the-box detection rules. | true | Malware |
intention | text | The threat intel intent. This is used by some out-of-the-box detection rules. | true | malicious |
source | text | The name of the source and the link to its site, such as your team and your team’s wiki. | true | {"name":"internal_security_team", "url":"https://teamwiki.example.org"} |
ip_address,additional_data,category,intention,source
192.0.2.1,"{""ref"":""hxxp://example.org""}",scanner,suspicious,"{""name"":""internal_security_team"", ""url"":""https://teamwiki.example.org""}"
192.0.2.2,"{""ref"":""hxxp://example.org""}",scanner,suspicious,"{""name"":""internal_security_team"", ""url"":""https://teamwiki.example.org""}"
192.0.2.3,"{""ref"":""hxxp://example.org""}",scanner,suspicious,"{""name"":""internal_security_team"", ""url"":""https://teamwiki.example.org""}"
Datadog supports creating reference tables either by a manual upload or by periodically retrieving the data from Amazon S3, Azure storage, or Google Cloud storage.
Notes:
On a new reference table page:
When the reference table is created from cloud storage, it is refreshed periodically. The entire table is replaced. Data is not merged.
See the related reference table documentation for:
If a reference table is not refreshing, open the reference table’s settings menu and select View Change Events.
View Change Events opens a page in Event Management showing potential error events for the ingestion. You can also filter in Event Management using the reference table name.
In Datadog Event Management, it may appear that data has been fetched from the cloud, but it can take a few additional minutes for those changes to propagate to Threat Intelligence. Other useful cloud import details to remember:
To enable Cloud SIEM threat intelligence data for reference tables:
After applying a reference table to Cloud SIEM, all incoming logs are evaluated against the table using a specific Indicator of Compromise (IoC) key, such as an IP address. If a match is found, the log is enriched with relevant Threat Intelligence (TI) attributes from the table, which enhances detection, investigation, and response.
A threat intelligence reference table can be shared across multiple security products.
추가 유용한 문서, 링크 및 기사: